Sciweavers

12562 search results - page 2257 / 2513
» Distributed Xbean Applications
Sort
View
COMPUTER
2007
103views more  COMPUTER 2007»
15 years 3 months ago
Examining the Challenges of Scientific Workflows
Workflows have recently emerged as a paradigm for representing and managing complex distributed scientific computations and therefore accelerate the pace of scientific progress. A...
Yolanda Gil, Ewa Deelman, Mark H. Ellisman, Thomas...
IJNSEC
2006
98views more  IJNSEC 2006»
15 years 3 months ago
Comment on Improvement of the Miyazaki-Takaragi Threshold Digital Signature Scheme
To enhance applications of smart cards, Miyazaki and Takaragi proposed a (t, n) threshold digital signature scheme based on the security of elliptic curve discrete logarithm (ECDL...
Zuhua Shao
IJNSEC
2006
270views more  IJNSEC 2006»
15 years 3 months ago
Efficient Key Agreement for Large and Dynamic Multicast Groups
Secure multicast represents the core component of many web and multimedia applications such as pay-TV, teleconferencing, real-time distribution of stock market price and etc. The ...
Liming Wang, Chuan-Kun Wu
JIPS
2008
130views more  JIPS 2008»
15 years 3 months ago
Inverted Index based Modified Version of KNN for Text Categorization
: This research proposes a new strategy where documents are encoded into string vectors and modified version of KNN to be adaptable to string vectors for text categorization. Tradi...
Taeho Jo
ISSE
2006
15 years 3 months ago
Modeling security as a dependability attribute: a refinement-based approach
Abstract As distributed, networked computing systems become the dominant computing platform in a growing range of applications, they increase opportunities for security violations ...
Ali Mili, Frederick T. Sheldon, Lamia Labed Jilani...
« Prev « First page 2257 / 2513 Last » Next »